Abstract
Grounded on the design science research process and the literature review of the existing body of knowledge, the current and own research contribution was framed into a model as displayed in Fig. 3.1. A broad research framework was developed that identified the critical variables for measurements derived from various and existing privacy frameworks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
More information on privacy paradox is in Chap. 2.
References
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies, (pp. 36–58). Springer.
Aïmeur, E., Gambs, S., & H, A. (2009). UPP: User privacy policy for social networking sites. In 2009 Fourth international conference on internet and web applications and services.
Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66–84.
Bezdek, J. C. (1974). Cluster validity with fuzzy sets. Journal of Cybernetics, 3(3), 58–73.
Bezdek, J., & Hathaway, R. (2002). VAT: A tool for visual assessment of (cluster) tendency. In IJCNN (pp. 2225–2230).
Bezdek, J. C., Ehrlich, R., & Full, W. (1984). FCM: The fuzzy c-means clustering algorithm. Computers and Geosciences, 10(2–3), 191–203.
Campello, R. J., & Hruschka, E. R. (2006). A fuzzy extension of the silhouette width criterion for cluster analysis. Fuzzy Sets and Systems, 157(21), 2858–2875.
Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: global concerns and local responses. New Media & Society, 11(3), 395–416.
Dave, R. N. (1996). Validating fuzzy partitions obtained through c-shells clustering. Pattern Recognition Letters, 17(6), 613–623.
Dey, R., Jelveh, Z., & Ross, K. (2012). Facebook users have become much more private: A large-scale study. In 2012 IEEE International conference on pervasive computing and communications workshops (PERCOM workshops) (pp. 346–352). IEEE.
Dunn, J. C. (1973). A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters. Journal of Cybernetics, 3(3), 32–57.
Fang, L., & LeFevre, K. (2010). Privacy wizards for social networking sites. In Proceedings of the 19th international conference on world wide web.
Fivaz, J., & Schwarz, D. (2007). Nailing the pudding to the wall–e-democracy as catalyst for transparency and accountability. In International conference on direct democracy in Latin America (pp. 14–15).
Garzia, D., & Marschall, S. (2012). Voting advice applications under review: the state of research. International Journal of Electronic Governance, 5(3–4), 203–222.
Giordani, P., & Ferraro, M. B. (2015). Package ‘fclust’: fuzzy clustering. CRAN R studio.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on privacy in the electronic society (pp. 71–80).
Gustafson, D. E., & Kessel, W. C. (1979). Fuzzy clustering with a fuzzy covariance matrix. In 1978 IEEE conference on decision and control including the 17th symposium on adaptive processes (pp. 761–766). IEEE.
Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45.
Huang, Z. (1997). A fast clustering algorithm to cluster very large categorical data sets in data mining. DMKD, 3(8), 34–39.
Huckfeldt, R., & Sprague, J. (1987). Networks in context: The social flow of political information. American Political Science Review, 81(4), 1197–1216.
Jiu-Lun Fan, C.-M. W., & Ma, Y.-L. (2000). A modified partition coefficient. In Signal Processing Proceedings (vol. 3, pp. 1496–1499). IEEE.
Johnson, M., Egelman, S., & Bellovin, S. M. (2012). Facebook and privacy: It’s complicated. In Proceedings of the eighth symposium on usable privacy and security.
Kang, R., Dabbish, L., Fruchter, N., & Kiesler, S. (2015). My data just goes everywhere? User mental models of the internet and implications for privacy and security. In Symposium on usable privacy and security (SOUPS) (pp. 39–52). USENIX Association Berkeley, CA.
Kaskina, A. (2018). Exploring nuances of user privacy preferences on a platform for political participation. In 2018 International conference on eDemocracy & eGovernment (ICEDEG) (pp. 89–94). IEEE.
Kaskina, A., & Meier, A. (2016). Integrating privacy and trust in voting advice applications. In Third international conference on eDemocracy & eGovernment (ICEDEG) (pp. 20–25). IEEE.
Kaskina, A., & Radovanovic, N. (2016). How to build trust-aware voting advice applications? In International conference on electronic government and the information systems perspective (pp. 48–61). Springer.
Katakis, I., Tsapatsoulis, N., Mendez, F., Triga, V., & Djouvas, C. (2014). Social voting advice applications – definitions, challenges, datasets and evaluation. IEEE Transactions on Cybernetics, 44(7), 1039–1052.
Kaufman, L., & Rousseeuw, P. J. (2009). Finding groups in data: An introduction to cluster analysis (vol. 344). John Wiley & Sons.
Kim, Y. (2011). The contribution of social network sites to exposure to political difference: The relationships among SNSS, online political messaging, and exposure to cross-cutting perspectives. Computers in Human Behavior, 27(2), 971–977.
Kim, D.-W., Lee, K. H., & Lee, D. (2004). On cluster validity index for estimation of the optimal number of fuzzy clusters. Pattern Recognition, 37(10), 2009–2025.
Knijnenburg, B. P. (2017). Privacy? i can’t even! making a case for user-tailored privacy. IEEE Security & Privacy, 15(4), 62–67.
Knijnenburg, B. P., & Kobsa, A. (2013). Making decisions about privacy: Information disclosure in context-aware recommneder systems. ACM Transactions on Interactive Intelligent Systems, 3(3), 1–23.
Knijnenburg, B., Kobsa, A., & Jin, H. (2013). Dimensionality of information disclosure behavior. Journal of Human-Computer Studies, 71(12), 1144–1162.
Kobsa, A. (2001). Tailoring privacy to users’ needs. In International conference on user modeling (pp. 301–313). Springer.
Krasnova, H., Günther, O., Spiekermann, S., & Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society, 2(1), 39–63.
Kwon, K. H., Moon, S.-I., & Stefanone, M. A. (2015). Unspeaking on Facebook? Testing network effects on self-censorship of political expressions in social network sites. Quality & Quantity, 49(4), 1417–1435.
Ladner, A., & Meier, A. (2014). Digitale politische Partizipation-Spannungsfeld zwischen MyPolitics und OurPolitics. HMD Praxis der Wirtschaftsinformatik, 51(6), 867–882.
Lederer, S., Hong, J. I., Dey, A. K., & Landay, J. A. (2004). Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing, 8(6), 440–454.
Li, Y., Kobsa, A., Knijnenburg, B. P., Nguyen, C., et al. (2017). Cross-cultural privacy prediction. Proceedings on Privacy Enhancing Technologies, 2017(2), 113–132.
Liu, K., & Terzi, E. (2010). A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data (TKDD), 5(1), 6.
Meier, A. (2012). eDemocracy and eGovernment: Stages of a democratic knowledge society. Springer-Verlag, Berlin, Heidelberg.
Meier, A., Kaskina, A., & Teran, L. (2018). Politische Partizipation–eSociety anders gedacht. HMD Praxis der Wirtschaftsinformatik (pp. 1–13).
Munemasa, T., & Iwaihara, M. (2011). Trend analysis and recommendation of users? Privacy settings on social networking services. In International conference on social informatics (pp. 184–197). Springer.
Pal, N. R., & Bezdek, J. C. (1995). On cluster validity for the fuzzy c-means model. In IEEE transactions on fuzzy systems (vol. 3). IEEE.
Portmann, E. (2012). The FORA framework: A fuzzy grassroots ontology for online reputation management. Springer Science & Business Media.
Quercia, D., Casas, D. L., J.P. Pesce, D. S., Kosinski, M., Almeida, V., & Crowcroft (2012). Facebook and privacy: The balancing act of personality, gender, and relationship currency. In ICWSM.
Reinhardt, D., Engelmann, F., & Hollick, M. (2015). Can I help you setting your privacy? A survey-based exploration of users’ attitudes towards privacy suggestions. In Proceedings of the 13th international conference on advances in mobile computing and multimedia (pp. 347–356). ACM.
Rokach, L., & Maimon, O. (2005). Clustering methods. In Data mining and knowledge discovery handbook (pp. 321–352). Springer.
Sawaya, Y., Sharif, M., Christin, N., Kubota, A., Nakarai, A., & Yamada, A. (2017). Self-confidence trumps knowledge: A cross-cultural study of security behavior. In Proceedings of the 2017 CHI conference on human factors in computing systems (pp. 2202–2214). ACM.
Smith, L. I. (2002). A tutorial on principal components analysis. Technical report.
Stutzman, F., Gross, R., & Acquisti, A. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality, 4(2). https://doi.org/10.29012/jpc.v4i2.620.
Terán, L., & Mancera, J. (2017). Applying dynamic profiles on voting advice applications. In Wirtschaftsinformatik in Theorie und Praxis (pp. 153–175). Springer.
Walgrave, S., Nuytemans, M., & Pepermans, K. (2009). Voting aid applications and the effect of statement selection. West European Politics, 32(6), 1161–1180.
Wang, W., & Zhang, Y. (2007). On fuzzy cluster validity indices. Fuzzy Sets and Systems, 158(19), 2095–2117.
Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.
Wisniewski, P., Knijnenburg, B., & Lipford, H. (2017). Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies, 98, 95–108.
Wu, K.-L., & Yang, M.-S. (2005). A cluster validity index for fuzzy clustering. Pattern Recognition Letters, 26(9), 1275–1291.
Xie, X. L., & Beni, G. (1991). A validity measure for fuzzy clustering. IEEE Transactions on Pattern Analysis and Machine Intelligence, 13(8), 841–847.
Yao, M. Z., Rice, R. E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the Association for Information Science and Technology, 58(5), 710–722.
Young, A. L., & Quan-Haase, A. (2009). Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In Proceedings of the fourth international conference on communities and technologies (pp. 265–274). ACM.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kaskina, A. (2022). Citizen Privacy Profile Framework. In: Citizen Privacy Framework. Fuzzy Management Methods. Springer, Cham. https://doi.org/10.1007/978-3-031-06021-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-06021-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06020-5
Online ISBN: 978-3-031-06021-2
eBook Packages: Business and ManagementBusiness and Management (R0)